Symmetry and Asymmetry in Cryptography and Cyber Security

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 183

Special Issue Editor


E-Mail
Guest Editor
1. Department of Computer Science and Automatics, Faculty of Mechanical Engineering and Computer Science, University of Bielsko-Biala, 43-309 Bielsko-Biala, Poland
2. Department of Computer Science, West Ukrainian National University, 46009 Ternopil, Ukraine
Interests: information security; cryptographic transformations; cyber-physical systems; cryptography

Special Issue Information

Dear Colleagues,

Symmetry and asymmetry lie at the heart of cryptography, shaping the landscape of modern cybersecurity. The dichotomy between symmetric and asymmetric cryptographic schemes underscores their fundamental roles in securing digital communications and data. In the realm of cybersecurity, the dynamics of symmetry and asymmetry dictate the balance of power between attackers and defenders, influencing the effectiveness of defensive measures and the resilience of systems against malicious actors.

This Special Issue seeks to explore the nuanced interplay of symmetry and asymmetry in cybersecurity. We invite contributions that delve into various facets of this theme, including but not limited to novel cryptographic techniques, comparative analyses of symmetric and asymmetric protocols, the implications of quantum computing on cryptographic resilience, and strategies for mitigating emerging cyber threats through advanced cryptographic methodologies.

The scope of this Special Issue includes, but is not limited to, the following:

  • Symmetric cryptography.
  • Asymmetric cryptography.
  • Cryptographic hash functions.
  • Cryptanalysis.
  • Symmetry in cryptanalytic techniques.
  • Quantum cryptography.
  • Cyber security applications.
  • Symmetry in network security protocols.
  • Symmetric cryptography in IoT security.
  • Symmetry in Blockchain and distributed systems.
  • Symmetry in digital forensics and data protection.

Dr. Ruslan Shevchuk
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • cryptosystems
  • cryptanalysis
  • cryptographic protocols
  • quantum cryptography
  • applied cryptography
  • database security
  • distributed system security
  • blockchain
  • digital forensics
  • data protection
  • web security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers

This special issue is now open for submission, see below for planned papers.

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: A symmetric encryption scheme based on a Pythagorean Triplets formula
Authors: Nadav Voloch
Affiliation: Ruppin Academic Center, Israel
Abstract: In the past decades cryptography and specifically encryption schemes were vastly researched. This is due to the developments in technology, communication, and the rising needs to use better, more resilient encryption for different types of attacks, that are getting more sophisticated and use much more computational power than before. For these encryption schemes, there is usually a use of mathematical computation, and different problems that are hard to solve, thus creating stronger schemes. There has been a use also in different classical problems of mathematics like computing prime numbers, using elliptic curves and lattices. In this paper we suggest a novel safe encryption scheme, that is based on a formula for manufacturing Pythagorean triplets (where both perpendiculars and hypotenuse are integers). We present the decryption and encryption formulas along with several examples of their operation and encoding results we achieved with the algorithm

Back to TopTop